MacOS Safari Exploit Exposes Camera, Mic, Browser Data

MacOS Safari Exploit Exposes Camera, Mic, Browser Data
A security weakness in the Safari browser on macOS devices might have exposed users to spying, data theft, and other ...
Read more

AI and cybersecurity – A double-edged sword

AI and cybersecurity – A double-edged sword
The role of AI is being discussed far and wide – from individuals wondering how AI will affect their futures,  ...
Read more

Ex-Oracle, Google Engineers Raise $7m From Accel

Ex-Oracle, Google Engineers Raise m From Accel
PRESS RELEASE October 17, 2024: OpenAI is projected to generate over $10 billion in revenue next year, a clear sign that ...
Read more

Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption

Beware of Starbucks Phishing Scam and China using Quantum tech to break encryption
Starbucks Coffee Lovers Box Phishing Scam Alert Starbucks is making headlines due to a phishing scam targeting its customers with ...
Read more

Is a CPO Still a CPO? Privacy Leadership’s Evolving Role

Is a CPO Still a CPO? Privacy Leadership’s Evolving Role
COMMENTARY The role of the CPO — chief privacy officer — is at a crossroads. A rapidly growing number of ...
Read more

Amazon helps in nabbing Anonymous Sudan cyber criminals

Amazon helps in nabbing Anonymous Sudan cyber criminals
For the first time in the history of the tech industry, the U.S. Department of Justice (DOJ) has publicly acknowledged ...
Read more

Chinese Researchers Tap Quantum to Break Encryption

Chinese Researchers Tap Quantum to Break Encryption
Researchers at China’s Shanghai University have demonstrated how quantum mechanics could pose a realistic threat to current encryption schemes even ...
Read more

Data Poisoning threatens AI platforms raising misinformation concerns

Data Poisoning threatens AI platforms raising misinformation concerns
AI-based chatbots are increasingly becoming integral to our daily lives, with services like Gemini on Android, Copilot in Microsoft Edge, ...
Read more

North Korea Hackers Get Cash Fast in Linux Cyber Heists

North Korea Hackers Get Cash Fast in Linux Cyber Heists
North Korean threat actors are using a Linux variant from a malware family known as “FASTCash” to conduct a financially ...
Read more

Do Passkeys Truly Boost Cybersecurity in the Future?

Do Passkeys Truly Boost Cybersecurity in the Future?
As the digital landscape evolves, so too do the methods used by cybercriminals to exploit vulnerabilities in online security. Traditional ...
Read more